LotusCMS version 3.0 remote PHP code execution exploit as disclosed in 2011. It spawns a reverse shell.
56acf18780a5602a4ab5e831ef3c7a6cfef83560842950e615cae1fc4847bc4b
This Metasploit module exploits a vulnerability found in Lotus CMS 3.0's Router() function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call, therefore allowing remote code execution. The module can either automatically pick up a 'page' parameter from the default page, or manually specify one in the URI option.
9cfa92781759b0e3fca07d4e2381bdf31f60c42eb04c18946ce17fa3ef4f50c3